Skip to content

Disk Disposal and Data Recovery


author =       "Simson Garfinkel and Abhi Shelat", author_a =       "Simson L. Garfinkel and Abhi Shelat", title =        "Remembrance of Data Passed", journal =      "{IEEE} Security and Privacy Magazine", publisher =    "IEEE", year      =         "2002", month     = Jan, url=""


Evidence Gathering

Fake Information

Feature Extraction and Data Fusion

Computer Location Determination Through Geoparsing and Geocoding of Extracted Features @inproceedings{garfinkel:cda,

title="Forensic feature extraction and cross-drive analysis", author="Simson Garfinkel", booktitle={Proceedings of the 6th Annual Digital Forensic Research Workshop (DFRWS)}, address = "Lafayette, Indiana", journal="Digital Investigation", year=2006, month=Aug, url="", location="Lafayette, Indiana"


Text Mining

Computer Forensic Text Analysis with Open Source Software, by Christian Johansson, Masters Thesis, Blekinge Tekniska Hogskola, June 2003

Signed Evidence


title="Information Assurance Applied to Authentication of Digital Evidence", author="Thomas E. Duerr and Nicholas D. Beser and Gregory P. Staisiunas", year=2004, journal="Forensic Science Communications", volume=6, number=4, url=""



author    = {Rolf Oppliger and Ruedi Rytz}, title     = {Digital Evidence: Dream and Reality}, journal   = {IEEE Security {\&} Privacy}, volume    = {1}, number    = {5}, year      = {2003}, pages     = {44-48}, url       = {}, abstract="Digital evidence is inherently weak. New evidence-gathering technologies-digital black boxes-must be developed and deployed to support investigations of irreproducible events such as digitally signing a document."



A Hypothesis-Based Approach to Digital Forensic Investigations, by Brian D. Carrier, Ph.D. Dissertation Purdue University, May 2006

Other Papers